Any attack taking years isn't going to be operationally relevant.
I suspect this protocol was developed basically as a computational complexity trade off to keep within those sorts of boundaries.
Any attack taking years isn't going to be operationally relevant.
I suspect this protocol was developed basically as a computational complexity trade off to keep within those sorts of boundaries.